CS6230 - Topics in Information Security

Kindly send me an email stating your preferred presentation slot and paper by 16th August 2014, 12pm.
Do note that the slot number and paper number are independent, meaning you have to select one from each list. 

In addition, kindly use your school email account to send the email (as well as future emails) to me.

Slides from the lecture can be downloaded from IVLE.

Student List

1)      Cai Zhenquan

2)      Ho Wee Kit

3)      Hong Hande

4)      Shruti Tople

5)      Ankit Sarkar

6)      Lim Wee Yong

7)      Ashok Balasubramanian

8)      Shweta Shinde

9)      Sankhadeep Roy

10)    Mohammad Mobashir

11)    Vishal Choudhary

                                     
                      
 






 

 

 

 

 Presentation Slots

14 August - (Lecture 1 + Presentation and Paper Review) Forensic Carving of Network Packets and Associated Data Structures (by Vrizlynn Thing)

1.      21 August - The Core of the Matter: Analyzing Mailicious Traffic in Cellular Carriers (by Vishal Choudhary)

2.      28 August -  Android Permissions Demystified (by Cai Zhenquan)

3.      4 September - Detecting Hoaxes, Frauds, and Deception in Writing Style Online (by Ankit Sarkar)

4.      11 September - An Historical Examination of Open Source Releases and Their Vulnerabilities (by Ho Wee Kit)

5.      18 September - Guess again (and again and again): Measuring Password Strength by Simulating Password-Cracking Algorithms (by Shruti Tople)

6.      25 September - Recess Week

7.      2 October - I Still Know What You Visited Last Summer - Leaking Browsing History via User Interaction and Side Channel Attacks (by Ashok Balasubramanian)

8.      9 October - Fashion Crimes: Trending-Term Exploitation on the Web (by Lim Wee Yong)

9.      23 October - The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authenticaiton Schemes (by Shweta Shinde)

10.   30 October - Using Fingerprint Authentication to Reduce System Security: An Empirical Study (by Sankhadeep Roy)

11.   6 November - (sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers (by Hong Hande)

12.   13 November - Click Trajectories: End-to-End Analysis of the Spam Value Chain (by Mohammad Mobashir )

 


List of Papers

 

1.      Zachary Weinberg, Eric Y. Chen, Pavithra Ramesh Jayaraman, and Collin Jackson, "I Still Know What You Visited Last Summer - Leaking Browsing History via User Interaction and Side Channel Attacks", IEEE Symposium on Security and Privacy, 2011.

2.      Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Mark Felegyhazi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon Mccoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker and Stefan Savage, "Click Trajectories: End-to-End Analysis of the Spam Value Chain", IEEE Symposium on Security and Privacy, 2011.

3.      Tyler Moore, Nektarios Leontiadis and Nicolas Christin, "Fashion Crimes: Trending-Term Exploitation on the Web", ACM Conference on Computer and Communications Security, 2011.

4.      Philip Marquardt, Arunabh Verma, Henry Carter and Patrick Traynor, "(sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers", ACM Conference on Computer and Communications Security, 2011.

5.      Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song and David Wagner, "Android Permissions Demystified", ACM Conference on Computer and Communications Security, 2011.

6.      Hugh Wimberly, and Lorie M. Liebrock, “Using Fingerprint Authentication to Reduce System Security: An Empirical Study, IEEE Symposium on Security and Privacy, 2011

7.      Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart and Thomas Shrimpton, "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail", IEEE Symposium on Security and Privacy, 2012.

8.      Rui Wang, Shuo Chen and Xiaofeng Wang, "Signing Me onto Your Accounts through Facebook and Google - A Traffic Guided Security Study of Commercially Deployed Single-Sign-On Web Services", IEEE Symposium on Security and Privacy, 2012.

9.      Sadia Afroz, Michael Brennan and Rachel Greenstadt, "Detecting Hoaxes, Frauds, and Deception in Writing Style Online", IEEE Symposium on Security and Privacy, 2012.

10.   Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay and Timothy Vidas, "Guess again (and again and again): Measuring Password Strength by Simulating Password-Cracking Algorithms", IEEE Symposium on Security and Privacy, 2012.

11.   Joseph Bonneau, "The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords", IEEE Symposium on Security and Privacy, 2012.

12.   Joseph Bonneau, Cormac Herley, Paul C. van Oorschot and Frank Stajano, "The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authenticaiton Schemes", IEEE Symposium on Security and Privacy, 2012.

13.   Nigel Edwards, Liqun Chen, "An Historical Examination of Open Source Releases and Their Vulnerabilities", ACM Conference on Computer and Communications Security, 2012.

14.   Shobha Venkataraman, David Brumley, Subhabrata Sen, "Automatically Inferring the Evolution of Malicious Activity on the Internet", Network and Distributed System Security Symposium, 2013.

15.   Davide Canali, Davide Balzarotti, "Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web", Network and Distributed System Security Symposium, 2013.

16.   Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, Ben Y. Zhao, "Social Turing Tests: Crowdsourcing Sybil Detection", Network and Distributed System Security Symposium, 2013.

17.   Andrew M. White, Srinivas Krishnan, Michael Bailey, Fabian Monrose, Phillip Porras, "Clear and Present Data: Opaque Traffic and its Security Implications for the Future", Network and Distributed System Security Symposium, 2013.

18.   Charles Lever, Manos Antonakakis, Brad Reaves, "The Core of the Matter: Analyzing Mailicious Traffic in Cellular Carriers", Network and Distributed System Security Symposium, 2013.

19.   Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos, "SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets", IEEE Symposium on Security and Privacy, 2013.

20.   Joel Reardon, David Basin, Srdjan Capkun,  "SoK: Secure Data Deletion", IEEE Symposium on Security and Privacy, 2013.

21.   Suman Jana, Arvind Narayanan and Vitaly Shmatikov, "A Scanner Darkly: Protecting User Privacy From Perceptual Applications", IEEE Symposium on Security and Privacy, 2013.